Dutch politician Mitchel van der Krogt., who also moonlighted as a hacker, is believed to have participated in 2014’s Celebgate.
iVerify is a security toolkit for iPhones and iPads. It can check the security of your device to see if modifications have taken place, such as jailbreaking or other forms of hacking. It also has a Safari content blocker.
iVerify is your personal security toolkit. Use iVerify to manage the security of your iOS device and detect modifications to your smartphone. iVerify makes it easy to manage the security of your accounts and online presence with simple instructional guides.
I’m curious to see how long it will last. I’ve used two similar apps in the past that offered the same modification detection, but both were removed from the App Store. I don’t know if it was Apple’s doing or if each company independently removed it. App Store: US$4.99
About 2,000 NordVPN users have fallen victim to credential-stuffing attacks that let third-parties access their accounts.
While it’s likely that some accounts are listed in multiple lists, the number of user accounts easily tops 2,000. What’s more, a large number of the email addresses in the list I received weren’t indexed at all by Have I Been Pwned, indicating that some compromised credentials are still leaking into public view. Most of the Web pages that host these credentials have been taken down, but at the time this post was going live, at least one remained available on Pastebin, despite the fact Ars brought it to NordVPN’s attention more than 17 hours earlier.
NordVPN emailed all the publishers that have reported on its hack. In my opinion the company has been trying to downplay it. We’ll see if its recent security measures will improve the service, or if it’s lip service.
AvengerCon is a hacking convention for members of the US Cyber Command and government cyber operations community at the US CYBERCOM DreamPort facility.
AvengerCon is an event that is attracting the very best talent both from our DoD participants and also from some of the folks that are working with us outside of the DoD,” Luber said. “When you bring those very best cyber experts together, they get to learn, test out new ideas, and work in an environment that is hosted by and for DoD cyber operations community experts.
Apple filed a lawsuit against a company called Corellium. This company runs virtualization software that lets it emulate iOS. It responded to Apple’s lawsuit on Monday and said it makes iPhones safer. Oh, and it claims Apple owes it US$300,000.
Corellium’s key argument lies on the assumption that Corellium’s customers are looking for bugs with the intention of alerting Apple of their existence…For now, however, that is only an assumption…When Motherboard asked today whether they ever reported a bug in iOS found using Corellium, Mark Dowd, the founder of Azimuth, said: “no.”
That “no” is a pretty damning answer. If you claim that your software helps fix iOS bugs, you should probably also report those iOS bugs to Apple. At least if you also claim to make iPhones safer, because selling those bugs on the black market doesn’t do that.
Several Trend Micro apps were removed from the Mac App Store after they were found collecting user browser history.
Dr Cleaner, Dr Antivirus, and App Uninstall – utilities owned by the Japan-headquartered security house and distributed on the Mac App Store – are no longer available for download…Mac security guru Patrick Wardle noted last week that in addition to the advertised functions of removing adware and malware from Macs, the software also collected people’s personal data including their browsing history, then transmitted that data as a password-protected archive to a server on the internet.
As of this writing Dr. Antivirus is still in the MAS.
NordVPN admits it was hacked, saying that in March 2018 one of its data centers was accessed by a third party.
North Korean hacking group “Lazarus Group” has been targeting Macs with a bit of fake website used to promote an open source app that served as a trojan horse. The fake site was called JMT Trading, and was designed to look like a trading platform. To use the trading platform, you had to download an app from Github, but even though the app was open source, it contained malware for Macs, with the whole scheme being part of North Korea’s efforts to steal Bitcoin. Check out Forbes‘s report:
The hackers may then go a step further by contacting administrators and users of cryptocurrency exchanges, asking them to test and review their new app, Wardle told Forbes. If they get lucky, they get a bit of leverage in an official cryptocurrency vendor and start infecting targets.
John Martellaro and Andrew Orr join host Kelly Guimont to discuss Cellebrite’s new partnership and other iPhone hacks like Lightning cables.
Documents reveal that New York City law enforcement has a partnership with Cellebrite to hack iPhones.
Previously, if law enforcement wanted to get into newer devices, they had to send the phones to one of Cellebrite’s digital forensics labs, located in New Jersey and Virginia. But Cellebrite’s new UFED Premium program gave law enforcement the ability to “unlock and extract data from all iOS and high-end Android devices” on their own, using software installed on computers in their offices.
I’ve always wondered if eventually Apple will remove the Lightning port from the iPhone once wireless charging becomes the norm. Side effects may include better waterproofing and worsened hacking.
In a blog post today Microsoft says that Iranian hackers attacked a U.S. presidential campaign, current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran.
Four accounts were compromised as a result of these attempts; these four accounts were not associated with the U.S. presidential campaign or current and former U.S. government officials. Microsoft has notified the customers related to these investigations and threats and has worked as requested with those whose accounts were compromised to secure them.
No word yet on what time President Trump asked Iran to interfere with our elections.
This story doesn’t need me piling on, but I think it’s astounding that a media organization with integrity, gravitas, etc. etc. still hasn’t retracted its debunked theory one year later. And the journalists who wrote the story are now in charge of Bloomberg‘s cybersecurity division. If by some miracle we learn that there really are spy chips I will most certainly apologize. But with zero evidence, I think that probability is low.
There’s been a lot of smoke, but no firings. Quite the opposite. It’s been a year since Bloomberg Businessweek published an extensively debunked story claiming that companies including Apple and Amazon had been hacked. Yet since then, all of Bloomberg‘s few responses and actions have only doubled down on how this publication lacks credibility on the topic.
Another day, another data breach. This time it’s DoorDash and “unusual activity involving a third-party” affecting 4.9 million.
Twitter use axi0mX posted about how a new iOS exploit called checkm8 could lead to a “permanent unpatchable bootrom exploit” for iPhone 4s to iPhone X.
What I am releasing today is not a full jailbreak with Cydia, just an exploit. Researchers and developers can use it to dump SecureROM, decrypt keybags with AES engine, and demote the device to enable JTAG. You still need additional hardware and software to use JTAG.
I’m sure governments around the world will be in touch.
The White House is blocking an audit by Congress for its offensive hacking policy it has already used for cyberattacks against Russia and Iran.
The policy, which loosened the reins on military strikes against U.S. adversaries, has been withheld for more than a year from lawmakers — even those who regularly review classified material. Lawmakers from both parties are concerned the Trump administration could plunge the country into a cyberwar without congressional approval or oversight, or at the very least, provoke retaliation that causes serious damage at home.
The White House hacking strategy is: “Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing.“
Russian national Adrei Tyurin confessed to the 2014 hacking of JPMorgan Chase which stole the data of over 80 million customers.
Tyurin carried out the hacks at the direction of co-conspirator Gery Shalon, who used the stolen data to further a variety of schemes, including securities fraud. One scheme involved artificially inflating the price of certain publicly traded stocks by marketing them in a deceptive and misleading manner to customers of companies Tyurin had hacked.
Bryan Chaffin and Andrew Orr join host Kelly Guimont to discuss the latest botnet takedown and the new wave of Apple “headset” speculation.
Apple accidentally unpatched a vulnerability first patched in iOS 12.3, and researchers used it to create an iOS 12.4 jailbreak.
Paige Thompson, the Capital One hacker, possibly hacked 30 other companies, new court documents revealed. Victims aren’t yet known.
Security researcher “MG” presented some special Lightning cables at Def Con 2019 that can hack your computer.